Search results for "424"

showing 10 items of 86 documents

¿Cómo afecta la innovación en la satisfacción y la lealtad hacia el establecimiento minorista?

2021

Resumen En el presente estudio, se examinó el concepto de innovación en el sector minorista y se definieron sus relaciones con otras variables, como la satisfacción y la lealtad, tradicionalmente vinculadas con el establecimiento minorista. Para lograr los objetivos planteados, se delimitó un modelo teórico sustentado en la literatura, que se contrastó mediante un estudio empírico utilizando un cuestionario estructurado ad hoc aplicado a una muestra de 510 clientes de establecimientos de alimentación. El análisis de los datos se desarrolló mediante la técnica de regresión por mínimos cuadrados parciales. Los resultados permiten proponer un conjunto de recomendaciones para la gestión, fundam…

//id.loc.gov/authorities/subjects/sh85078691 [http]HF5001-6182Strategy and ManagementSatisfaction//vocabularies.unesco.org/thesaurus/concept1545 [http]//vocabularies.unesco.org/thesaurus/concept4566 [http]LoyaltyConsumer protectionAdvertisingManagement of Technology and InnovationCambio tecnológicosatisfaçãoBusinessInnovación de marketing//vocabularies.unesco.org/thesaurus/concept6424 [http]MarketingLealtadM30 Generalrelational innovationConductainovação de marketinginnovación de marketingInnovaciones tecnológicasmarketing innovationproduct innovationinovação de produtoInnovación en productoTime to market (New products)Viral marketingEconomics and EconometricsConductlealdade//id.loc.gov/authorities/subjects/sh2003011474 [.http]PublicidadSistema de valoresinovação relacional//vocabularies.unesco.org/thesaurus/concept1532 [http]Innovación relacionalinnovación relacionalNormas de conductainnovación en producto//vocabularies.unesco.org/thesaurus/concept403 [http]SatisfacciónMercadeoProtección del consumidorValue systemsBusiness and International ManagementlealtadMercadeo viral//id.loc.gov/authorities/subjects/sh85133143 [http]Technological changeStandards of ConductsatisfacciónTiempo en el mercado (Productos nuevos)//id.loc.gov/authorities/subjects/sh85117681 [http]//id.loc.gov/authorities/subjects/sh94006567 [http]Technological innovationsFinance
researchProduct

Dlk1 dosage regulates hippocampal neurogenesis and cognition

2021

Significance Generation of new neurons occurs normally in the adult brain in two locations: the subventricular zone (SVZ) in the walls of the lateral ventricles and the subgranular zone (SGZ) in the dentate gyrus (DG) of the hippocampus. Neurogenesis in the adult hippocampus has been implicated in cognitive functions such as learning, memory, and recovery of stress response. Imprinted genes are highly prevalent in the brain and have adult and developmental important functions. Genetic deletion of the imprinted gene Dlk1 from either parental allele shows that DLK1 is a key mediator of quiescence in adult hippocampal NSCs. Additionally, Dlk1 is exquisitely dosage sensitive in the brain with p…

0301 basic medicinehippocampusHippocampusgene dosageBiologySubgranular zone03 medical and health sciencesMice0302 clinical medicineCognitionNeuroplasticitymedicineAnimalsEpigeneticsImprinting (psychology)AllelesMultidisciplinarybehaviorDentate gyrusNeurogenesisCalcium-Binding Proteinsneurogenesis genomic imprinting behavior gene dosage hippocampus424Biological Sciencesgenomic imprintingneurogenesis030104 developmental biologymedicine.anatomical_structurenervous systemGenomic imprintingNeuroscience030217 neurology & neurosurgeryNeuroscience
researchProduct

Vēsture: Latvijas Universitātes Žurnāls, Nr.11/12

2021

Anatol Shmelev. In the Wake of Empire: Anti-Bolshevik Russia in International Affairs 1917–1920. Stanford California 2021. xiii + 572 p. ISBN 978-0-8179-2424-9 [Recenzija par grāmatu]Ingus Barovskis. Mythopoeia: mūsdienu mītrade. Rīga 2021. 277 lpp. ISBN 978-9934-18-678-3 [Recenzija par grāmatu]Krievijas Ziemeļrietumu armija (1919.–1920.)Ivars Ījabs. Sociāldemokrātija un valsts dibināšana: Latvija. Rīga 2018. 49 lp. ISBN 978-9934-19-670-6 [Recenzija par grāmatu]Spanish Civil War medical aidKārina Pētersone. Valstsvīrs Anatolijs Gorbunovs. Rīga 2020. 796 lpp. ISBN 978-9934-0-9244-2 [Recenzija]Emotions Florencejūrniecība latviešu trimdāUldis Bērziņš. Laikmets kad bija jāraud pat akmeņiem: dokumentu un atmiņu apkopojums. Limbaži 2021. 338 lpp. ISBN 978-9934-596-16-2 [Recenzija par grāmatu]:HUMANITIES and RELIGION::History and philosophy subjects::History subjects [Research Subject Categories]Latvijas akadēmiski izglītoto sieviešu apvienībaLatvijas Igaunijas un Lietuvas armijas virspavēlnieku un to pārstāvju apspriede Valkā 1920. gada 6. janvārīZigmārs Turčinskis. Ziemeļ latgales “Neatkarības vienība”. Pretošanās padomju okupācijai. 1946.–1954. gads. Rīga 2021. 574 lpp. ISBN 978-9934-15-909-1 [Recenzija par grāmatu]Rīgas Arodbiedrību centrālbiroja darbība [Sociālās apdrošināšana]Susan R. Grayzel Tammy M. Proctor (eds.). Gender and the Great War. New York 2017. 286 p. ISBN 978-0-1902-7108-4 [Recenzija par grāmatu]
researchProduct

Separation of presynaptic Cav2 and Cav1 channel function in synaptic vesicle exo- and endocytosis by the membrane anchored Ca2+ pump PMCA

2021

Significance Synaptic vesicle (SV) release from presynaptic terminals requires nanometer precise control of action potential (AP)–triggered calcium influx through voltage-gated calcium channels (VGCCs). SV recycling also depends on calcium signals, though in different spatiotemporal domains. Mechanisms for separate control of SV release and recycling by AP-triggered calcium influx remain elusive. Here, we demonstrate largely independent regulation of release and recycling by two different populations of VGCCs (Cav2, Cav1), identify Cav1 as one of potentially multiple calcium entry routes for endocytosis regulation, and show functional separation of simultaneous calcium signals in the nanome…

Drosophila ; Dmca1D ; cacophony ; PMCA ; synapse0301 basic medicine570ATPasecacophonyPresynaptic TerminalsAction PotentialsEndocytosisDmca1DSynaptic vesicleExocytosis03 medical and health scienceschemistry.chemical_compoundGlutamatergicPlasma Membrane Calcium-Transporting ATPases0302 clinical medicinePMCAsynapsemedicineAnimalsDrosophila ProteinsAxonNeurotransmitterProbabilityMotor NeuronsMultidisciplinaryVoltage-dependent calcium channelbiologyCell Membrane424500 Naturwissenschaften und Mathematik::570 Biowissenschaften; Biologie::570 Biowissenschaften; BiologieBiological SciencesEndocytosisCell biologyElectrophysiology030104 developmental biologymedicine.anatomical_structureDrosophila melanogasterchemistryReceptors Glutamatebiology.proteinDrosophilaCalciumCalcium ChannelsSynaptic Vesicles030217 neurology & neurosurgeryNeuroscienceProceedings of the National Academy of Sciences of the United States of America
researchProduct

SCADA Intrusion Detection System Test Framework

2017

Master's thesis Information- and communication technology IKT590 - University of Agder 2017 Supervisory control and data acquisition (SCADA) systems play an important role in our critical infrastructure (CI). Several of the protocols used in SCADA communication are old and lack of security mechanisms. This master thesis presents a SCADA Intrusion Detection System Test Framework that can be used to simulate SCADA traffic and detect malicious network activity. The framework uses a signature-based approach and utilize two different IDS engines, Suricata and Snort. The IDS engines include rule-sets for the IEC 60870-5-104, DNP3 and Modbus protocols. The IDS engines ships detected events to a di…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og Naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424SCADAIDSSIEM
researchProduct

SIP based IP-telephony network security analysis

2004

Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad This thesis evaluates the SIP Protocol implementation used in the Voice over IP (VoIP) solution at the fibre/DSL network of Èlla Kommunikasjon AS. The evaluation focuses on security in the telephony service, and is performed from the perspective of an attacker trying to find weaknesses in the network. For each type of attempt by the malicious attacker, we examined the security level and possible solutions to flaws in the system. The conclusion of this analysis is that the VoIP service is exploitable, and that serious improvements are needed to achieve a satisfying level of security for the system.

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Kommunikasjon og distribuerte systemer: 423VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

Security in GPRS

2001

Masteroppgave i informasjons- og kommunikasjonsteknologi 2001 - Høgskolen i Agder, Grimstad GPRS offers the user an “always on” connection to Internet and Intranet. Some of the services may require high level of security. This can be financial transaction over the Internet, or exchange of confidential documents from a company’s Intranet to an employee. It is important to have strong focus on the security, so companies and persons that demand high level of security can take advantage of the services GPRS offered. What normally happens is that the services wins against the security. This is in most cases adequate security for what a normal subscriber requires. This thesis covers which securit…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Kommunikasjon og distribuerte systemer: 423VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

Gateway security between Bluetooth and GSM/GPRS

2002

Masteroppgave i informasjons- og kommunikasjonsteknologi 2002 - Høgskolen i Agder, Grimstad The amount of wireless technologies is getting bigger and wider. It is more and more common in everyday use for a huge amount of the people. A cellular phone is something that everyone got in addition to normal access the Internet. So, why not both at the same time. When data is transmitted over the Internet and are communicating with wireless technologies, there are several vulnerable points. There have to be secure data communication, and the security is only something that should lay behind which people do not have to think about. Unfortunately, this is not the way it is, there are different techn…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

Personal firewall in mobile phone

2004

Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad The assignment described in this master thesis is given by Ericsson AS and gives an evaluation of a need for a personal firewall in mobile phone. In today’s commercial products personal firewall in mobile phone does not exist. This master thesis analyzes the role of personal firewall in different scenarios. At the beginning of the master thesis functions that already exist in personal firewall for PC were discussed in the sense of which could be useful in personal firewall for mobile phone. This master thesis also covers description of connection between personal firewall and virus in addition to wha…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424
researchProduct

Formation of secure wireless ad-hoc sensor networks

2004

Masteroppgave i informasjons- og kommunikasjonsteknologi 2004 - Høgskolen i Agder, Grimstad Looking into the wireless world today, the most of data/information is transmitted in plaintext over the ether. These sensitive data/information possibly route through several intermediate nodes to a destination. To secure the sensitive data/information, the various ad-hoc technologies like Bluetooth, WLAN and ZigBee have implemented different security mechanisms and routing protocols. But since most wireless ad-hoc networks demand battery driven devices they will have limit resources to provide feasible security. The different technologies will be outlined regarding a set case scenario. We have a pa…

IKT590ComputerSystemsOrganization_COMPUTER-COMMUNICATIONNETWORKSVDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Sikkerhet og sårbarhet: 424VDP::Matematikk og naturvitenskap: 400::Informasjons- og kommunikasjonsvitenskap: 420::Systemutvikling og -arbeid: 426
researchProduct